Home > Research > Publications & Outputs > Securely Storing and Sharing Memory Cues in Mem...

Electronic data

  • paper

    Rights statement: ©2019 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

    Accepted author manuscript, 2 MB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

Securely Storing and Sharing Memory Cues in Memory Augmentation Systems: A Practical Approach

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

Published
Close
Publication date11/03/2019
Host publication 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom)
PublisherIEEE
Number of pages10
ISBN (Electronic)9781538691489, 9781538691472
ISBN (Print)9781538691496
Original languageEnglish
Event 2019 IEEE International Conference on Pervasive Computing and Communications - Kyoto, Japan
Duration: 11/03/201915/03/2019

Conference

Conference 2019 IEEE International Conference on Pervasive Computing and Communications
Abbreviated titlePerCom
CountryJapan
CityKyoto
Period11/03/1915/03/19

Conference

Conference 2019 IEEE International Conference on Pervasive Computing and Communications
Abbreviated titlePerCom
CountryJapan
CityKyoto
Period11/03/1915/03/19

Abstract

A plethora of sensors embedded in wearable, mobile, and infrastructure devices allow us to seamlessly capture large parts of our daily activities and experiences. It is not hard to imagine that such data could be used to support human memory in the form of automatically generated memory cues, e.g., images, that help us remember past events. Such a vision of pervasive “memory-augmentation systems”, however, comes with significant privacy and security implications, chief among them the threat of memory manipulation: without strong guarantees about the provenance of captured data, attackers would be able to manipulate our memories by deliberately injecting, removing, or modifying captured data. This work introduces this novel threat of human memory manipulation in memory augmentation systems. We then present a practical approach that addresses key memory manipulation threats by securing the captured memory streams. Finally we report evaluation results on a prototypical secure camera platform that we built.

Bibliographic note

©2019 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.